Paessler Blog

Smart devices, smart buildings, and smart cities: With IoT, the trend is clear that we will be analyzing and monitoring large parts of our personal and community life in the future. As a monitoring company, we follow this process with an alert eye and many projects dealing with the topic of IoT.

In 2018 it's important to be mindful that the person you ask to marry you will be the same one you watch stare at their phones for the rest of your lives together! I mention this as I just got married last week in Walt Disney World and I write this blog while my husband is at the pool on our honeymoon!

Two months have passed since our last 'Microsoft Teams Monday' here on the blog. It's time to get news about Microsofts Office 365 group chat software, especially as the latest version presents several juicy new features.

Rupert Collier&nbsp;interviews Chris Dancy to find out more about how he became so connected and how humans and technology will coincide and cohabit in the future. Listen to the podcast to see how dystopian our future could be. Or read the very gappy summary below.

In our daily lives, doctors will point to our dietary intake as a predictor of long-term health. The number one recommendation is to eat the right amount and types food. If we’re honest with ourselves, we’re probably not where our doctors want us to be. In the world of Business and Technology, these things remain true for our data consumption. So, where do we start? Simple; design a diet, stick to it, and watch for issues.

Huawei is a Chinese multinational networking, telecommunications equipment and services company that was founded in 1987. Huawei has developed product for the Enterprise, Small to Medium Business (SMB) and consumer market.

Frequent cybercrime news reports, and also surveys, show that the human factor in IT Security Management (ITSM) is often given too little consideration. Often, the weakest link in the chain are the employees of an organization and not the IT infrastructure itself. This fact leads directly to the question of “how a comprehensive IT security culture can be developed and maintained within an organization”.&nbsp;Some&nbsp;key aspects&nbsp;to be considered.

Having a perfectly fitting database management system (DBMS) is a key component for today’s business success. The DBMS manages the interaction between your applications and the underlying database. It assures that the correct data is available for the requested user group when needed. When choosing a DBMS from the variety of concepts and vendors, you should consider the following points before making a decision.

Palo Alto Networks based in Santa Clara, California provides their 45,000+ customers in 150+ countries a "Next-Generation Security Platform" through their firewalls and security management tools. Palo Alto Networks is the security company maintaining trust in the digital age by helping organizations prevent cyber breaches.

Did you ever ask yourself what are possible tasks for PRTG Network Monitor beyond using predefined sensors? PRTG is famous for its self-explaining web interface and its intuitive handling. So, you can perform most of your tasks without taking your hands off the mouse. Moreover, PRTG offers a wide variety of additional capabilities to monitor network related stuff. One thing we will have a closer look today is using the command line interface.

We are very pleased to announce the last PRTG Sensor Contest winner: Andreas Ginther, who dealt with the topic of Smart Home and who has taken us by storm with his love of detail and excellent documentation.

»The Internet of Things is not a concept; it is a network, the true technology-enabled network of all networks.« – Edewede Oriwoh It’s hard to think of anything more vague than the term&nbsp;Internet of Things.&nbsp;It can mean anything from concrete trends, pieces of tech to a network of physical devices, home appliances, vehicles, and other items, embedded with software, sensors and network connectivity - which enable these objects to connect and exchange data. The Internet of Things promises a&nbsp;complete new era of network monitoring, where the number of things that are connected to the network and the amount of data they generate will grow exponentially.

Something happens after IT teams implement a bandwidth monitoring solution: They get inquisitive. Most bandwidth monitoring solutions make it easy for IT teams to identify alarming or sudden peaks in their network traffic by communicating the data through graphical interfaces. There are many different causes of sudden network spikes, and as a good sysadmin you should find the root cause of any unusual bandwidth usage.